CN101815302B - Frequency spectrum access method using idle channel in cognitive radio network - Google Patents

Frequency spectrum access method using idle channel in cognitive radio network Download PDF

Info

Publication number
CN101815302B
CN101815302B CN201010033972.2A CN201010033972A CN101815302B CN 101815302 B CN101815302 B CN 101815302B CN 201010033972 A CN201010033972 A CN 201010033972A CN 101815302 B CN101815302 B CN 101815302B
Authority
CN
China
Prior art keywords
channel
idle
authorization
secondary users
frequency spectrum
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201010033972.2A
Other languages
Chinese (zh)
Other versions
CN101815302A (en
Inventor
刘元安
刘凯明
翟临博
唐碧华
谢刚
高锦春
李莉
黎淑兰
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing University of Posts and Telecommunications
Original Assignee
Beijing University of Posts and Telecommunications
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing University of Posts and Telecommunications filed Critical Beijing University of Posts and Telecommunications
Priority to CN201010033972.2A priority Critical patent/CN101815302B/en
Publication of CN101815302A publication Critical patent/CN101815302A/en
Application granted granted Critical
Publication of CN101815302B publication Critical patent/CN101815302B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Abstract

The invention provides a frequency spectrum access method using communication of a selected idle authorized channel in a cognitive radio network. The method comprises the following steps: periodically perceiving a plurality of authorized channels and recording channel states which comprise a busy/idle state, utilization rate and waiting time by using each secondary (non-authorized) user in the cognitive radio network; and interacting control frames by the secondary users at transceiving two ends, calculating the maximum time that the secondary users can be accessed to the idle channels according to the utilization rate of the idle channels in the current network, selecting the idle authorized channel capable of transmitting maximum traffic, and performing communication between the secondary users on the selected channel. The method can solve the problems of a 'hidden' terminal and an 'exposed' terminal at the same time.

Description

A kind of frequency spectrum access method that utilizes idle channel in cognitive radio networks
Technical field
The invention belongs to the frequency spectrum access method in a kind of wireless network communication technique field, particularly a kind of utilization selected the cognitive radio frequency spectrum cut-in method that idle authorization channel is communicated by letter, by the testing result to a plurality of authorization channels, select selected idle authorization channel, and utilize the frequency spectrum access method of selected selected idle authorization channel.
Background technology
Along with the arrival of information age, radio communication is developed rapidly, and people require to improve constantly to service quality and data rate, and following assignable Radio Resource will be more and more rare, and frequency spectrum rare becomes serious problems.The shortage of frequency spectrum resource is is mostly to cause because utilizing of wireless access technology is unreasonable.Current frequency spectrum distributing method is mainly based on fixed allocation mode; be that a certain wireless frequency spectrum piece is distributed to a certain specific Radio Access Network; and then this wireless frequency spectrum piece is divided into several frequency spectrum sub-blocks, the protection frequency range of the fixed size in interval each other.Although the mode that this fixed frequency spectrum is distributed is very simple for spectrum management, and research shows, have quite a few frequency spectrum in time with space on and be underutilized, traditional fixed frequency spectrum distribution method has reduced the availability of frequency spectrum.Such as most of communication networks are all to consider based on the maximum delivery flow rate of this network possibility, but in fact, wireless communication networks is not oepration at full load, at different location different time, to the utilization of frequency spectrum, be different, therefore, the spectrum allocation may mode of this static state has caused the waste of frequency spectrum resource.
In order to improve the utilance of wireless frequency spectrum, cognitive radio (CognitiveRadio) technology that the free time authorizes frequency spectrum to carry out secondary use is arisen at the historic moment.Cognitive radio system is an intelligent wireless communication system, can perception environment around, utilize its Intellisense ability, unauthorized user (claiming again Secondary Users), dynamic perception mandate frequency spectrum, in the situation that not disturbing authorized user, use at a time, the mandate frequency range of somewhere free time communicates, thereby improved the availability of frequency spectrum.
The frequency spectrum access method of existing wireless system can not be for cognitive radio system, and this is mainly because: (1) traditional frequency spectrum access method does not need to consider the interference to authorized user; (2) traditional frequency spectrum Access Algorithm is difficult to real-time adjustment, can not use the requirement of high flexibility and real-time in cognitive radio system; (3) traditional frequency spectrum Access Algorithm has only been considered the access of single frequency spectrum, can not adapt to the access requirement of discrete spectrum in cognitive radio system.
Summary of the invention
The object of this invention is to provide and a kind ofly unauthorized user is detected and utilize idle mandate frequency spectrum, be intended to improve the cognitive radio frequency spectrum cut-in method that utilizes selected idle channel when authorizing the availability of frequency spectrum, reach and both meet Secondary Users and can rationally utilize mandate spectrum communication, do not disturb again the object of the normal use authority frequency spectrum of authorized user.
Concrete steps of the present invention are:
First step: the state of all authorization channels in maintaining network
Each Secondary Users all safeguards an authorization channel status list separately, represents the state of all authorization channels in network.The current busy-idle condition that the state of each channel comprises this channel, utilance and stand-by period three part: current busy-idle condition represents that the current state of channel is idle or busy (representing respectively idle and busy with 0 and 1); Utilance represents the busy extent (span is between 0-1) that the authorized user of channel uses; Stand-by period represents that authorization channel is current in busy state, need to just meeting idle (duration that represents the stand-by period with the number of time slot) after waiting for the regular hour.
(1) the current busy-idle condition of channel obtains by the detection of antenna.
Each Secondary Users periodically detects (duration in each cycle equals a system time gap σ) to the current busy-idle condition of authorization channel.To any one authorization channel x, with U t(x) be illustrated in the channel busy situation (1 represents to do, and 0 represents not to be in a hurry) that t cycle perceives, can obtain
(2) channel utilization obtain 2 kinds of modes: according to Secondary Users self, the testing result of authorization channel is calculated, and the control frame of monitoring other Secondary Users.
Mode 1: the sensing results according to Secondary Users to authorization channel, at the channel utilization V in t cycle t(x) be calculated as follows
V t(x)=(1-α)V t-1(x)+αU t(x) (1)
Wherein, V t-1(x) represent the utilance of one-period channel x before this, severe degree that α and channel utilization change relevant (0 < α < 1, the Shaoxing opera of channel utilization variation is strong, α more trends towards 1, what change is slower, and α more trends towards 0).
Mode 2: the control frame of monitoring other Secondary Users.In order to upgrade accurately rapidly the channel utilization of all authorization channels in the channel list of self maintained, Secondary Users are except self is to the perception of authorization channel, also, by monitor other Secondary Users' control frame at control channel, upgrade the channel list of oneself safeguarding.
Because Secondary Users are before communication, want first at the mutual control frame of control channel, and in control frame, comprising channel utilization and stand-by period, therefore by monitoring other Secondary Users' control frame, according to the corresponding field in control frame, can obtain the channel utilization that other user awareness arrive, directly to upgrade the utilance of each channel in the channel list of oneself safeguarding.
(3) stand-by period (take system time gap σ as least unit) obtains by monitor other Secondary Users' control frame at control channel.
Owing to comprising the stand-by period in control frame, other Secondary Users once communicate by letter and take the time of authorization channel, therefore, by monitoring other Secondary Users' control frame, the time that can obtain other CU channels, upgrade the channel list of oneself safeguarding.To any one authorization channel x, when stand-by period Wait (x) is 0, represent that channel x is idle; When stand-by period Wait (x) is non-zero, represent to wait for that Wait (x) time, channel x just can be idle afterwards.
Second step: mutual control frame, with the idle authorization channel of selecting to select, and solves " hiding " terminal and " exposure " terminal problem
Before the Secondary Users of transmitting-receiving two-end communicate, first carry out the mutual of control frame, control frame is divided into two kinds: CRTS (Control request to send) and CCTS (Control clear to send).The numbering that CRTS comprises the idle channel in current network and each self-corresponding channel utilization, comprise selected selected idle authorization channel in CCTS, the channel utilization that this channel is corresponding, and Secondary Users utilize the time of this channel.
The transmission of control frame adopts 2 system exponential backoff mechanism, as shown in Figure 1:
When control channel idle, and free time reach after a long interFrameGap DIFS, after waiting for a random backoff value, transmitting terminal Secondary Users start to send CRTS so, backoff value is a random value of selecting from [0, w-1], wherein w keeps out of the way window.When control channel idle, and free time reach the duration σ of a system time gap, backoff value just successively decreases 1, otherwise backoff value meeting " is freezed " and remained unchanged.Once backoff value is decremented to 0, user starts to send CRTS.The authorization channel status list that originating subscriber is safeguarded according to oneself, selects current idle channel (being that current channel condition is free time and stand-by period to be 0 channel), and the numbering of these channels and utilance are separately inserted to CRTS, sends to receiving end.
When receiving end is received after CRTS, according to the channel utilization of the authorization channel list of the content update self maintained of CRTS, and the busy-idle condition of the channel in perception CRTS.If the channel in CRTS is all busy, do not respond CCTS, represent to send unsuccessfully; If have a channel idle at least, by method below, calculate the time (representing with maximum timeslot number) of access idle channel:
To an idle channel x, when channel utilization V (x) is 0, represent that authorization channel is current and unoccupied, but primary user probably uses this channel in certain time after this, so Secondary Users can not unconfinedly take this channel.In order to make Secondary Users' access not interfere with as much as possible primary user, set m and access the maximum timeslot number upper limit of channel x for Secondary Users.When channel utilization V (x) is 0, the maximum timeslot number that Secondary Users access channel x is m.
When channel utilization V (x) is non-zero, with M (x) be illustrated in do not have and situation that primary user clashes under Secondary Users access the maximum timeslot number of channel x,
P{M(x)=i}=(1-V(x)) iV(x) V(x)>0,i>0 (2)
Therefore, Secondary Users access the average timeslot number of maximum of channel x and are
E [ M ( x ) ] = &Sigma; i = 1 &infin; iP { M ( x ) = i } = 1 - V ( x ) V ( x ) - - - ( 3 )
When the utilance V of channel (x) is in close proximity to 0, very large by calculating the average timeslot number of maximum of access channel x, in order to make Secondary Users' access not disturb as much as possible primary user, the average timeslot number of maximum that Secondary Users access channel x can not surpass the upper limit m setting, E [ M ( x ) ] = min { 1 - V ( x ) V ( x ) , m } .
Therefore, according to Secondary Users, access the maximum timeslot number E[M (x) of idle channel x] and the data rate R (x) of channel x, the traffic carrying capacity that can once can transmit at channel x for Secondary Users is
E [ M ( x ) ] = m V ( x ) = 0 min { 1 - V ( x ) V ( x ) , m } V ( x ) > tra ( x ) = &sigma;E [ M ( x ) ] R ( x ) - - - ( 4 )
By method above, can calculate Secondary Users' traffic carrying capacity that each idle channel once can transmit.The Secondary Users' that relatively each idle channel can transmit traffic carrying capacity, the idle authorization channel that receiving terminal selection can be transmitted traffic peak is selected channel.If there is the traffic carrying capacity of a plurality of transmissions identical, so random channel of selection.After waiting for a short interFrameGap SIFS, receiving terminal is encapsulated in selected selected channel, corresponding channel utilization and transmission time in CCTS, response to making a start.Make a start and receive after CCTS, represent control frame interaction success.
When the Secondary Users that have two or more send CRTS simultaneously, can produce conflict, receiving end user cannot normally accept, and sends unsuccessfully.Other user listens to after this conflict, and meeting is " freezing " backoff value separately within the period of EIFS (equaling time+DIFS that SIFS+ sends CCTS).If made a start, in CCTS timeout period (SIFS+ send CCTS time), do not receive the CCTS response frame of receiving end, think the retransmission mechanism that sends failure and start 2 system exponential backoff.To 2 system exponential backoff mechanism, when transmitting CRTS for the first time, w equals the minimum value CW of competition window min, retransmitting at every turn, w doubles until reach the maximum CW of competition window min.
Make a start and the process of the mutual control frame of receiving terminal (CRTS and CCTS) in, other Secondary Users listen to after CRTS and CCTS, the authorization channel status list of meeting basis content update oneself wherein: with the channel utilization in the list of the channel utilization renewal in the control frame of receiving oneself, the transmitting time of the selected channel in CCTS is inserted to the stand-by period part of respective channels in own list.
" hide " solution of terminal and " exposure " terminal problem:
Secondary Users, before carrying out transfer of data, first will complete the mutual of control frame.When transmitting terminal, Secondary Users send CRTS, after receiving terminal Secondary Users receive, respond CCTS.
Secondary Users as " hiding " terminal listen to after receiving terminal user's CCTS, can upgrade the authorization channel status list of oneself, by the list that the utilance of the user-selected fixed selected idle authorization channel of receiving terminal (supposing channel x) and transmission time write oneself, the value of wait (x) is the transmission time.If during transmitting terminal and receiving terminal telex network, the Secondary Users of " hiding " terminal will send data to other Secondary Users, are hidden transmitting terminal.Because when " hiding " terminal use and sending CRTS to its destination, to first look into channel status list, because the wait (x) of channel x in the authorization channel list of " hiding " terminal use maintenance is non-zero, so this channel can not inserted to CRTS, " hide " terminal use and will can not use channel x with communicating by letter of destination, Gu do not affect communicating by letter of transmitting terminal and receiving terminal.If " hide " terminal use, will receive data from other users, be hidden receiving terminal.When " hiding " terminal use receives after other users' CRTS, authorization channel state in perception CRTS, if channel x is in CRTS, because " hiding " terminal use is not within the coverage of transmitting terminal, therefore it is idle perceiving this channel, can adopt this channel to receive other users' data.
Secondary Users as " exposure " terminal listen to after transmitting terminal user's CCTS, can upgrade the authorization channel status list of oneself, owing to only comprising channel utilization in CRTS, do not contain the duration, so the wait value of each channel in " exposure " terminal use's channel list can not change (being still 0).If during transmitting terminal and receiving terminal telex network (suppose selected be channel x), " exposures " terminal use will send data to other Secondary Users, it is exposure transmitting terminal.Because " exposure " terminal use, when sending CRTS to destination, first look into the channel status list of oneself, because the wait (x) of channel x is 0, so this channel is inserted to CRTS, can select this channel and destination to communicate.When during transmitting terminal and receiving terminal telex network, " exposure " terminal use will receive data from other users, for exposing receiving terminal.Because " exposure " terminal use is after receiving other users' CRTS, authorization channel state in perception CRTS, if channel x is in CRTS, because " exposure " terminal use is within the coverage of transmitting terminal, therefore it is busy perceiving channel x, can not adopt this channel to receive other users' data.
Third step: transfer of data
After control frame completes alternately, the Secondary Users of transmitting-receiving two-end are adjusted to operating frequency the selected channel of selection by control channel, start transfer of data.The maximum time that Secondary Users once access selected channel is the average timeslot number of the maximum calculating above.
If the data volume that Secondary Users need be transmitted is larger, cannot within the maximum time calculating, complete transmission, to re-start the mutual of control frame, again select selected channel to complete the transmission of remaining data.
Due to primary user and do not know Secondary Users' existence, if transmitted in the process of data Secondary Users, primary user communicates at this selected channel, will produce conflict.Once conflict occurs, Secondary Users will stop communication at once, and transmitting-receiving two-end is all made as m by wait value corresponding to this channel, and operating frequency is adjusted back to control channel, and to re-start control frame mutual, to complete selected channel selection.
Accompanying drawing explanation
Accompanying drawing 1 is the key diagram of the process of transmitting of control frame in content of the present invention, and accompanying drawing 2 is the flow chart of intermediate frequency spectrum access access procedure of the present invention.
Embodiment
Below in conjunction with accompanying drawing and examination example, the invention will be further described, but this embodiment should not be construed as limitation of the present invention.
1. the state of all authorization channels in maintaining network
Each Secondary Users all safeguards an authorization channel status list separately, represents the state of all authorization channels in network, supposes total J authorization channel in current network.The current busy-idle condition that the state of each channel comprises this channel, utilance and stand-by period three part: current busy-idle condition represents that the current state of channel is idle or busy; Utilance represents the busy extent that the authorized user of channel uses; Stand-by period represents that authorization channel is current in busy state, need to after waiting for the regular hour, just understand idle.
(1) the current busy-idle condition of channel obtains by the detection of antenna.
Each Secondary Users periodically carries out perception (duration in each cycle equals a system time gap σ) to the current busy-idle condition of authorization channel.To any one authorization channel x, with U t(x) be illustrated in the channel busy situation (1 represents to do, and 0 represents not to be in a hurry) that t cycle perceives.
(2) channel utilization obtain 2 kinds of modes: according to Secondary Users self, the sensing results of authorization channel is calculated, and the control frame of monitoring other Secondary Users.
Mode 1: the sensing results according to Secondary Users to authorization channel, at the channel utilization V in t cycle t(x) be calculated as follows shown in formula
V t(x)=(1-α)V t-1(x)+αU t(x)
Wherein, V t-1(x) represent the utilance of one-period channel x before this, severe degree that α and channel utilization change relevant (0 < α < 1, the Shaoxing opera of channel utilization variation is strong, α more trends towards 1, what change is slower, and α more trends towards 0).
Mode 2: the control frame of monitoring other Secondary Users.In order to upgrade accurately rapidly the channel utilization of all authorization channels in the channel list of self maintained, Secondary Users are except self is to the perception of authorization channel, also, by monitor other Secondary Users' control frame at control channel, upgrade the channel list of oneself safeguarding.
Because Secondary Users are before communication, want first at the mutual control frame of control channel, and in control frame, comprising channel utilization and stand-by period, therefore by monitoring other Secondary Users' control frame, can obtain the channel utilization that other user awareness arrive, directly to upgrade the utilance of each channel in the channel list of oneself safeguarding.
(3) stand-by period (take system time gap σ as least unit) obtains by monitor other Secondary Users' control frame at control channel.
Owing to comprising the stand-by period in control frame, other Secondary Users once communicate by letter and take the time of authorization channel, therefore, by monitoring other Secondary Users' control frame, the time that can obtain other CU channels, upgrade the channel list of oneself safeguarding.To any one authorization channel x, when stand-by period Wait (x) is 0, represent that channel x is idle; When stand-by period Wait (x) is non-zero, represent to wait for that Wait (x) time, channel x just can be idle afterwards.
By method above, can obtain the status list of this J authorization channel, as shown in the table
Table authorization channel status list
2. select selected idle authorization channel solution " hiding " terminal and " exposure " terminal problem before the Secondary Users of transmitting-receiving two-end communicate, first carry out the mutual of control frame.
When control channel idle, and free time reach after a long interFrameGap DIFS, after waiting for a random backoff value, transmitting terminal Secondary Users start to send CRTS so, backoff value is a random value of selecting from [0, w-1], wherein w keeps out of the way window.When control channel idle, and free time reach the duration σ of a system time gap, backoff value just successively decreases 1, otherwise backoff value meeting " is freezed " and remained unchanged.Once backoff value is decremented to 0, user starts to send CRTS.Originating subscriber is according to the authorization channel status list of own maintenance, select current idle channel (be channel number be 1 and the channel of J), (1 and J) and utilance are separately inserted CRTS by numbering, and send to receiving end.
When receiving end is received after CRTS, according to the channel utilization of the authorization channel list of the content update self maintained of CRTS, and the state of perception 1 channel and J channel.If be all busy, do not respond CCTS, represent to send unsuccessfully; If wherein have a channel idle at least, by method presented above, calculate the time (representing with maximum timeslot number) of access idle channel:
Set on the maximum timeslot number of current channel access and be limited to m=100, the data rate of channel 1 is 5Mbps.To idle channel 1, when channel utilization V (1) is 0.1, by E [ M ( x ) ] = &Sigma; i = 1 &infin; iP { M ( x ) = i } = 1 - V ( x ) V ( x ) Calculating, the average timeslot number of maximum that Secondary Users access channel 1 is 9, is less than the upper limit, so the maximum timeslot number that Secondary Users can access channel 1 is 9.Secondary Users are in channel 1, and the traffic carrying capacity that once can transmit is tra (1)=σ E[M (1)] R (1)=450 (bit).
Equally, the data rate of channel J is 1Mbps.To idle channel J, when channel utilization V (J) is 0.01, by E [ M ( x ) ] = &Sigma; i = 1 &infin; iP { M ( x ) = i } = 1 - V ( x ) V ( x ) Calculating, the average timeslot number of maximum that Secondary Users access channel J is 99, is less than the upper limit, so the maximum timeslot number that Secondary Users can access channel J is 99.Secondary Users are in channel J, and the traffic carrying capacity that once can transmit is tra (J)=σ E[M (J)] R (J)=1980 (bit).
The Secondary Users' that relatively idle channel 1 and idle channel J can transmit traffic carrying capacity, the idle authorization channel J that can transmit traffic peak is selected channel.After waiting for a short interFrameGap SIFS, selected selected channel J, corresponding channel utilization (0.01) and transmission time (99) are encapsulated in CCTS, response to making a start.Make a start and receive after CCTS, represent control frame interaction success.
When the Secondary Users that have two or more send CRTS simultaneously, can produce conflict, receiving end user cannot normally accept, and sends unsuccessfully.Other user listens to after this conflict, and meeting is " freezing " backoff value separately within the period of EIFS (equaling time+DIFS that SIFS+ sends CCTS).If made a start, in CCTS timeout period (SIFS+ send CCTS time), do not receive the CCTS response frame of receiving end, think the retransmission mechanism that sends failure and start 2 system exponential backoff.To 2 system exponential backoff mechanism, when transmitting CRTS for the first time, w equals the minimum value CW of competition window min, retransmitting at every turn, w doubles until reach the maximum CW of competition window min.
Make a start and the process of the mutual control frame of receiving terminal (CRTS and CCTS) in, other Secondary Users listen to after CRTS and CCTS, the authorization channel status list of meeting basis content update oneself wherein: with the channel utilization in the list of the channel utilization renewal in the control frame of receiving oneself, the transmitting time of the selected channel in CCTS (99) is inserted to the stand-by period part of respective channels in own list.
Existing Secondary Users A, B, C, D, when A will send data to B, C is beyond the coverage of A, and in the coverage of B, therefore C is concealed terminal.
At A, to B, send before data, first send CRTS, B responds CCTS.When C listens to after the CCTS of B, can upgrade the authorization channel status list of oneself, the list that the utilance of selected idle authorization channel (supposing channel x) that A is communicated by letter with B and transmission time write oneself, the value of wait (x) is the transmission time.If will send data to D at A and B communication period C, C is hidden transmitting terminal.Because C is when sending CRTS to D, to first look into channel status list, because the wait (x) of channel x in the authorization channel list of C maintenance is non-zero, so this channel can not inserted to CRTS, communicating by letter and will can not use channel x between C and D, Gu do not affect communicating by letter of A and B.If C will receive data from D, C is hidden receiving terminal.When C receives after the CRTS of D, the authorization channel state in perception CRTS, if channel x in CRTS, therefore because C is not within the coverage of A, it is idle perceiving this channel, can adopt this channel to carry out communicating by letter between D and C.
While supposing that B will send data to A, C is beyond the coverage of A, and in the coverage of B, therefore C is exposed terminal.
At B, to A, send before data, first send CRTS, A responds CCTS.When C listens to after the CRTS of B, can upgrade the authorization channel status list of oneself, owing to only comprising channel utilization in CRTS, do not contain the duration, so the wait value of each channel in the channel list of C can not change (being still 0).If at B and A communication period (suppose selected be channel x), C will send data to D, C is for exposing transmitting terminal.Because C, when sending CRTS to D, first look into the channel status list of oneself, because the wait (x) of channel x is 0, so this channel is inserted to CRTS, can select this channel to carry out communicating by letter of C and D.When receiving data from D at B and A communication period C, for exposing receiving terminal.Because C is after receiving the CRTS of D, the authorization channel state in perception CRTS, if channel x in CRTS, therefore because C is within the coverage of B, it is busy perceiving channel x, can not adopt this channel to carry out communicating by letter between D and C.
3. transfer of data
After control frame completes alternately, the Secondary Users of transmitting-receiving two-end are adjusted to operating frequency the selected channel J of selection by control channel, start transfer of data.The maximum time that Secondary Users once access selected channel can not surpass the average timeslot number 99 of maximum calculating.
The data volume that Secondary Users need be transmitted if made a start is larger, cannot in 99 time slots that calculate, complete transmission, so remaining data need to be waited at originating subscriber, until control frame success next time completes alternately, again select selected channel to complete the transmission of remaining data.
Due to authorized user and do not know Secondary Users' existence, if transmitted in the process of data Secondary Users, authorized user communicates at this selected channel J, will produce conflict.Once conflict occurs, Secondary Users will stop communication at once,, operating frequency is adjusted back to control channel, and to re-start control frame mutual, to complete selected channel, selects.
The known prior art of content term professional and technical personnel in the field not being described in detail in this specification.

Claims (7)

1. utilize a frequency spectrum access method for idle channel in cognitive radio networks, its concrete steps are:
Step 1: the state of all authorization channels in maintaining network
Each Secondary Users all safeguards an authorization channel status list separately, represents the state of all authorization channels in network; The current busy-idle condition that the state of each channel comprises this channel, utilance and stand-by period three part: current busy-idle condition represents that the current state of channel is idle or busy, idle with 0 expression, busy with 1 expression; Utilance represents the busy extent that the authorized user of channel uses, and span is between 0-1; Stand-by period represents that authorization channel is current in busy state, need to after waiting for the regular hour, just understand the free time, represents the duration of stand-by period with the number of time slot;
Step 2: select idle authorization channel
Secondary Users carry out the mutual of control frame, and transmitting-receiving two-end is realized and being shaken hands, and the process of shaking hands adopts binary exponential backoff mechanism; According to the utilance of idle authorization channel in current network, by following formula
E [ M ( x ) ] = m V ( x ) = 0 min { 1 - V ( x ) V ( x ) , m } V ( x ) > 0 tra ( x ) = &sigma;E [ M ( x ) ] R ( x ) - - - ( 1 )
Wherein: wherein V (x) represents channel utilization,
M represents the upper limit timeslot number of predefined any one channel of access,
σ represents the duration of each system time gap,
E[M (x)] represent that Secondary Users once access the average timeslot number of maximum of channel x,
R (x) represents the data rate of channel x,
Tra (x) represents Secondary Users' traffic carrying capacity that authorization channel x once can transmit;
Receiving terminal user selects to transmit the idle authorization channel of traffic peak, is selected idle authorization channel; Selected selected channel, corresponding channel utilization and transmission time are encapsulated in control frame, response to making a start; After making a start and receiving, represent control frame interaction success;
Step 3: the transmission of data
After control frame completes alternately, the Secondary Users of transmitting-receiving two-end are adjusted to operating frequency the selected channel of selection by control channel, carry out transfer of data; If transmitted in the process of data Secondary Users, authorized user communicates at this selected channel, will produce conflict; Once conflict occurs, Secondary Users will stop communication at once, re-start control frame mutual, to complete selected channel, select.
2. a kind of frequency spectrum access method that utilizes idle channel in cognitive radio networks according to claim 1, is characterized in that, in described maintaining network, in the step 1 of the state of all authorization channels, the detection mode of frequency spectrum resource is periodically to detect.
3. a kind of frequency spectrum access method that utilizes idle channel in cognitive radio networks according to claim 1, it is characterized in that, in described maintaining network in the step 1 of the state of all authorization channels, Secondary Users monitor other users' control frame, according to the corresponding field in control frame, upgrade the state of authorization channel list, the corresponding field in above-mentioned control frame comprises authorization channel numbering and corresponding utilance and stand-by period thereof.
4. a kind of frequency spectrum access method that utilizes idle channel in cognitive radio networks according to claim 1, it is characterized in that, in the step 2 of the idle authorization channel of described selection, idle authorization channel is common decision of Secondary Users by transmitting-receiving two-end, gets the common factor of the idle channel that two parties detects.
5. a kind of frequency spectrum access method that utilizes idle channel in cognitive radio networks according to claim 1, it is characterized in that, in the step 2 of the idle authorization channel of described selection, Secondary Users once access the maximum duration of certain idle authorization channel, and by getting this channel, maximum averaging time and the minimum value of predefined upper limit time of authorized CU do not obtain.
6. a kind of frequency spectrum access method that utilizes idle channel in cognitive radio networks according to claim 1, it is characterized in that, in the step 2 of the selected idle authorization channel of described selection, select each channel speed of comparison and Secondary Users once to access the product of the maximum duration of this channel, get the idle channel of product maximum as selected channel, once transmit the idle authorization channel of traffic peak.
7. a kind of frequency spectrum access method that utilizes idle channel in cognitive radio networks according to claim 1, it is characterized in that, in the step 3 of described transfer of data, if Secondary Users cannot complete transfer of data in the maximum duration calculating, to again carry out the mutual of control frame, select selected channel to complete the transmission of remaining data.
CN201010033972.2A 2010-01-07 2010-01-07 Frequency spectrum access method using idle channel in cognitive radio network Active CN101815302B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201010033972.2A CN101815302B (en) 2010-01-07 2010-01-07 Frequency spectrum access method using idle channel in cognitive radio network

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201010033972.2A CN101815302B (en) 2010-01-07 2010-01-07 Frequency spectrum access method using idle channel in cognitive radio network

Publications (2)

Publication Number Publication Date
CN101815302A CN101815302A (en) 2010-08-25
CN101815302B true CN101815302B (en) 2014-12-03

Family

ID=42622389

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201010033972.2A Active CN101815302B (en) 2010-01-07 2010-01-07 Frequency spectrum access method using idle channel in cognitive radio network

Country Status (1)

Country Link
CN (1) CN101815302B (en)

Families Citing this family (22)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102202317B (en) * 2011-05-14 2014-03-19 苏州大学 Method for accessing and exiting frequency spectrum of hybrid cognitive network
CN102364978B (en) * 2011-11-25 2013-01-09 哈尔滨工业大学 Radio communication method for acquiring united network state based on cognitive user signal transmission and spectrum sensing in cognitive radio network
CN102761879B (en) * 2012-06-21 2015-02-25 北京邮电大学 Method for realizing cognizing MAC (Media Access Control) protocol
CN103281698A (en) * 2013-05-24 2013-09-04 哈尔滨工业大学 Method for realizing frequency spectrum allocation in cognitive radio by applying static frequency spectrum aggregation technology
WO2015066915A1 (en) * 2013-11-11 2015-05-14 华为技术有限公司 Usage method and device for unlicensed spectrum
WO2015066911A1 (en) * 2013-11-11 2015-05-14 华为技术有限公司 Method and device for sending information
CN105264942B (en) * 2014-04-28 2020-09-04 镇江启越信息科技有限公司 Data transmission transmitting terminal equipment, receiving terminal equipment and method
CN105517181B (en) * 2014-09-25 2020-05-15 中兴通讯股份有限公司 Carrier resource processing method and device of unauthorized carrier and transmission node
CN104640228A (en) * 2015-01-26 2015-05-20 哈尔滨工业大学深圳研究生院 Non-preemptive spectrum access method based on negotiation
CN105898770B (en) * 2015-01-26 2020-12-11 中兴通讯股份有限公司 Empty channel detection method and node equipment
CN105897387A (en) * 2015-01-26 2016-08-24 中兴通讯股份有限公司 Data transmission method, device and system
CN105992345A (en) * 2015-01-27 2016-10-05 中兴通讯股份有限公司 Method and device for using unlicensed carrier resource
CN104539405B (en) * 2015-01-28 2018-02-13 深圳酷派技术有限公司 Channel detection method, Channel Detection system, base station and terminal
US20160302230A1 (en) * 2015-04-10 2016-10-13 Samsung Electronics Co., Ltd Methods and apparatus for rrm measurement on unlicensed spectrum
CN114759995A (en) * 2015-06-04 2022-07-15 索尼公司 Device for wireless communication, spectrum management device and user equipment
CN106332283B (en) * 2015-06-23 2019-10-11 中国移动通信集团公司 A kind of method, apparatus and equipment of the transmission of LAA system uplink
CN105163388A (en) * 2015-09-10 2015-12-16 北京邮电大学 Website and channel selection and aggregation method thereof
CN106131889A (en) * 2016-07-22 2016-11-16 北京邮电大学 A kind of data send the determination method and device of channel
CN106385690B (en) * 2016-09-13 2019-10-08 哈尔滨工业大学 With the recognizing star communication means based on spread spectrum slotted ALOHA in cooperation communication system
CN107094069B (en) * 2017-01-20 2020-04-28 电子科技大学 Cognitive radio smart power grid monitoring data compression access algorithm based on binary exponential backoff
CN107147455B (en) * 2017-06-02 2020-09-29 电子科技大学 Distributed access control method suitable for cognitive radio network
CN110784910B (en) * 2019-10-31 2021-10-01 西安邮电大学 LoRa network new service node access method

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101257714A (en) * 2008-04-08 2008-09-03 浙江大学 Across layer self-adapting paralleling channel allocating method of cognized radio system
CN101615926A (en) * 2009-07-31 2009-12-30 东南大学 Asynchronous cooperation frequency spectrum sensing method in the cognitive radio

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101257714A (en) * 2008-04-08 2008-09-03 浙江大学 Across layer self-adapting paralleling channel allocating method of cognized radio system
CN101615926A (en) * 2009-07-31 2009-12-30 东南大学 Asynchronous cooperation frequency spectrum sensing method in the cognitive radio

Also Published As

Publication number Publication date
CN101815302A (en) 2010-08-25

Similar Documents

Publication Publication Date Title
CN101815302B (en) Frequency spectrum access method using idle channel in cognitive radio network
EP2401886B1 (en) Scheduling and protection of quiet periods in a quiet zone for incumbent signal detection
CN101527915B (en) Band dynamic selecting and time scheduling method in heterogeneous network
CN104427632B (en) Data transmission scheduling method, device and system
CN102625466B (en) Distributed media access method used in wireless local area network
Ploennigs et al. Performance analysis of the EnOcean wireless sensor network protocol
CN101755476B (en) Link adaptation scheme
KR20040060964A (en) Optimally serving stations on wlans using contention/resource reservation protocol ieee 802.11e
CN104094652A (en) System and method for managing contention in a wireless communications system
CN102883460A (en) Service data transmitting method and system
WO2012162875A1 (en) Methods and apparatus for managing wireless communication using unlicensed frequency bands
CN105472753A (en) Cognitive small-cell dual resource allocation and disturbance management method based on LTE
CN101364908B (en) Method and apparatus for evaluating wireless channel quality
CN101286980A (en) Distributed media access control protocol for increasing capacity of wireless local area network
CN104066198B (en) The method and system of channel are selected in Wireless LAN
CN101631325B (en) Method for implementing control protocol of random and periodical media access of radio network
CN102724680B (en) Multi-channel perceptual sequence optimizing method on basis of Markov prediction in distributive cognitive radio network
Le Multi-channel MAC protocol for full-duplex cognitive radio networks with optimized access control and load balancing
CN102572847B (en) Spectrum allocation method and system
KR20050064267A (en) Data transmitting method for wireless network using access point
CN106375049B (en) Cognitive radio networks communication means
Chowdhury et al. Design of an efficient MAC protocol for opportunistic cognitive radio networks
Stine et al. Tactical communications using the IEEE 802.11 MAC protocol
KR101155049B1 (en) Method for collision avoidance in carrier sense multiple access with collision aviodance
Choi Clustering algorithm for hidden node problem in infrastructure mode IEEE 802.11 wireless LANs

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C14 Grant of patent or utility model
GR01 Patent grant